Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of Non-Idealities in the Generation of Reconfigurable Sinc-Shaped Optical Nyquist Pulses., , , , and . IEEE Access, (2021)Special Issue on Ontologies and Data Management: Part I., and . Künstliche Intell., 34 (3): 287-289 (2020)Ontologies and Data Management: A Brief Survey., and . Künstliche Intell., 34 (3): 329-353 (2020)Conservative Extensions in Horn Description Logics with Inverse Roles., , , and . J. Artif. Intell. Res., (2020)Experimental Comparison of Visual-Aided Odometry Methods for Rail Vehicles., , , , , , and . CoRR, (2019)Improved Universal Circuits using Lookup Tables., , , , , and . IACR Cryptol. ePrint Arch., (2022)Wide-Bandwidth, Enhanced-Quality Wireless Signal Detection with Low-Bandwidth Devices., , , , , , , and . OFC, page 1-3. IEEE, (2023)Verschlüsselt Rechnen: Sichere Verarbeitung verschlüsselter medizinischer Daten am Beispiel der Klassifikation von EKG-Daten., and . perspeGKtive, volume P-174 of LNI, page 11-25. GI, (2010)PrivMail: A Privacy-Preserving Framework for Secure Emails., , , and . ESORICS (2), volume 14345 of Lecture Notes in Computer Science, page 145-165. Springer, (2023)Web Application for Privacy-preserving Scheduling using Secure Computation., , and . ICETE (2), page 456-463. SciTePress, (2019)